Author Topic: Senate Bill Would Give President Obama Authority to Pull the Plug on Your Intern  (Read 309 times)

0 Members and 1 Guest are viewing this topic.

Offline ms

  • GBO Supporter
  • Trade Count: (0)
  • Senior Member
  • *****
  • Posts: 2442
Senate Bill Would Give President Obama Authority to Pull the Plug on Your Internet
Posted by: Dr. Mercola
November 03 2009 | 40,187 views


CNET News has obtained a summary of a proposal from Senators Jay Rockefeller (D-W.V.) and Olympia Snowe (R-Maine) that would create an Office of the National Cybersecurity Advisor, part of the Executive Office of the President. That office would receive the power to disconnect, if it believes they're at risk of a cyberattack, "critical" computer networks from the Internet.

“I regard this as a profoundly and deeply troubling problem to which we are not paying much attention," Rockefeller said at a hearing, referring to cybersecurity.

Senate bill 773 (The Cybersecurity Act of 2009) is causing a flurry of opposition from groups like Campaign for Liberty, which has sent out letters to their members appealing for them to take action against passage of this bill, stating:
“If the ‘Internet Takeover Bill’ passes, Barack Obama can silence his dissenters directly -- by ordering a shutdown of all Americans’ access to the Internet. But that’s not all. Even outside of periods of White House-declared ‘emergency,’ this bill mandates that private-sector networks only be managed by government-licensed cybersecurity professionals.”

Offline GH1

  • Trade Count: (1)
  • A Real Regular
  • ****
  • Posts: 939
  • Gender: Male
"...a new Cybersecurity Panel..."
Just what we need, more government.  >:(
Great.
GH1 :)
I owe my life to an organ donor

Offline MGMorden

  • Trade Count: (3)
  • Senior Member
  • *****
  • Posts: 2093
  • Gender: Male
This (the law, not the video segment) isn't about disconnecting you from the Internet - it's about the government giving the President authority to disconnect certainly government systems FROM the internet in the event of an online attack.

Given that the President (the office) is already regarded as the supreme military commander, this seems pretty common sense to me.

Computers are used more and more in government and military, and as has already been evidenced by the Chinese government hacking into some of our systems, computer based warfare is shaping up to be one of the main battlefields of the future.  Personally I think we'd be flat out daft NOT to have some plan in effect to segregate government and military systems from the main Internet in such an event.  

If you're really that worried about it, there are tools to get around most privacy violations that you might be worried about.

Just a few tips if you're worried:

1. Use Linux.  Unlike most other computer operating systems, the source code for Linux is publically avaialble and auditable.  As an overall project done by volunteers it's also not based in any one particular country that can have much influence on it.

2. Use TOR - The Onion Router.  This is an obfuscation technique that works by encrypting your packets under multiple layers of encryption.  The end result is that the computer that ends up receiving the data doesn't know where the original sender was on the internet - data outputs from the TOR network at a random exit gateway.

3. For even heavier security, use FreeNet.  This is almost like a second world wide web - it's not used to access the normal web.  Here, even the content you're accessing is floating somewhere out in the encrypted nether.  It's virtually impossible to trace down the sender or receiver of anything here.  Just know before you start using this though that FreeNet's encryption and obfuscation is used by all sorts of shady characters.  It's really a red light district where you have to accept that the anonymity that it offers you it offers all sorts of other people with agendas and tastes you might not like.

4. Always run a firewall.  This is common sense even from a standard viewpoint, but I can't stress enough that unless you have a good reason to, your computer should never accept incoming connection requests on any port.  

5.  Anything you don't want found, use TrueCrypt.  TrueCrypt is a virtual container encryption program much like the old PGP disk program, or BestCrypt, but TrueCrypt is free and open source (I can't stress enough that if you're concerned about what programs are doing on your system, open source is the way to go).  I work in government and we use this ourselves when sending data from us to software companies to make sure if the disk is lost in transit no one can access it's contents.  Essentially it creates a big file on your disk with military grade encryption applied.  You can then attach that file to a drive letter (say, H: if that's open) and use it like a big disk drive.  When you're done you disconnect the file from the drive letter.  None of the information you have within the file is then viewable without the password.  With the grade of encryption used here you're looking at the most powerful supercomputers on Earth taking millions of years to brute force crack it.  You keep your password safe and your data is safe.

Truthfully I'd be FAR more worried about what the copyright lobbyists will get the government to do rather than what the government itself is spying on just for the sake of spying.

Offline teamnelson

  • Trade Count: (30)
  • Senior Member
  • *****
  • Posts: 4487
  • Gender: Male
Whether you like or not, cyberdefense is now more important than missile defense. The alternative to this proposal is to move our nation off of network dependency for critical services like the power grid, banking, medical services, police services ... face it, our whole lives are ran on the internet now. A personal firewall on your linux based PC with strong password protection will not stop the green brigade in China from shutting off the power grid on the western seaboard, turning off medical, police and fire response, banking, commerce, etc. The issue isn't YOUR internet, the issue is THE internet and how easy it is to exploit it at the national and corporate level.

If you feel so strongly about deregulation of the internet, I suggest you keep your $ in a coffe can in your garden, along with a lifetime supply of meds and food.
held fast